CVE-2025-5367 – “PHPGurukul Online Shopping Portal SQL Injection Vulnerability”

The following table lists the changes that have been made to the CVE-2025-5367 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2025-48912: Apache Superset Flaw Allows Row-Level Security Bypass via SQL Injection

CVE-2025-48912: Apache Superset Flaw Allows Row-Level Security Bypass via SQL Injection A serious security vulnerability has been discovered in Apache Superset, a widely used open-source data exploration and visualization platform. The flaw exposes sensitive datasets to unauthorized acce … Read more Published Date: May 31, 2025 (1 hour, 59 minutes ago) Vulnerabilities has been mentioned in this […]

ConnectWise Cyberattack

ConnectWise Cyberattack In May 2025, ConnectWise, a major provider of IT automation and remote access tools, publicly confirmed a targeted cyberattack against its cloud-hosted ScreenConnect infrastructure. The attack has bee … Read more Published Date: May 31, 2025 (2 hours, 13 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-3935

CVE-2025-5365 – Campcodes Online Hospital Management System SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-5365 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]

CVE-2018-25111 – Django-Helpdesk Sensitive Data Exposure

The following table lists the changes that have been made to the CVE-2018-25111 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 31, 2025 Action […]